{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-4611","assignerOrgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","state":"PUBLISHED","assignerShortName":"Wordfence","dateReserved":"2024-05-07T14:59:27.872Z","datePublished":"2024-05-29T04:30:14.177Z","dateUpdated":"2026-04-08T17:25:08.103Z"},"containers":{"cna":{"providerMetadata":{"orgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","shortName":"Wordfence","dateUpdated":"2026-04-08T17:25:08.103Z"},"affected":[{"vendor":"scottopolis","product":"AppPresser – Mobile App Framework","versions":[{"version":"0","status":"affected","lessThanOrEqual":"4.3.2","versionType":"semver"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"The AppPresser plugin for WordPress is vulnerable to improper missing encryption exception handling on the 'decrypt_value' and on the 'doCookieAuth' functions in all versions up to, and including, 4.3.2. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they previously used the login via the plugin API. This can only be exploited if the 'openssl' php extension is not loaded on the server."}],"title":"AppPresser <= 4.3.2 - Improper Missing Encryption Exception Handling to Authentication Bypass","references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/d1498fdf-9d5e-4277-92be-469d6646864b?source=cve"},{"url":"https://plugins.trac.wordpress.org/browser/apppresser/trunk/inc/AppPresser_User.php?rev=2789173#L40"},{"url":"https://plugins.trac.wordpress.org/browser/apppresser/trunk/inc/AppPresser_Theme_Switcher.php?rev=2456516#L167"},{"url":"https://plugins.trac.wordpress.org/browser/apppresser/trunk/inc/AppPresser_Theme_Switcher.php?rev=2456516#L133"},{"url":"https://plugins.trac.wordpress.org/changeset/3093975/apppresser"}],"problemTypes":[{"descriptions":[{"lang":"en","description":"CWE-703 Improper Check or Handling of Exceptional Conditions","cweId":"CWE-703","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH"}}],"credits":[{"lang":"en","type":"finder","value":"István Márton"}],"timeline":[{"time":"2024-05-07T00:00:00.000Z","lang":"en","value":"Discovered"},{"time":"2024-05-07T00:00:00.000Z","lang":"en","value":"Vendor Notified"},{"time":"2024-05-28T00:00:00.000Z","lang":"en","value":"Disclosed"}]},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-4611","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2024-05-30T15:40:42.572321Z"}}}],"affected":[{"cpes":["cpe:2.3:a:apppresser:apppresser:-:*:*:*:*:wordpress:*:*"],"vendor":"apppresser","product":"apppresser","versions":[{"status":"affected","version":"0","versionType":"custom","lessThanOrEqual":"4.3.2"}],"defaultStatus":"unknown"}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:56:31.986Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T20:47:41.366Z"},"title":"CVE Program Container","references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/d1498fdf-9d5e-4277-92be-469d6646864b?source=cve","tags":["x_transferred"]},{"url":"https://plugins.trac.wordpress.org/browser/apppresser/trunk/inc/AppPresser_User.php?rev=2789173#L40","tags":["x_transferred"]},{"url":"https://plugins.trac.wordpress.org/browser/apppresser/trunk/inc/AppPresser_Theme_Switcher.php?rev=2456516#L167","tags":["x_transferred"]},{"url":"https://plugins.trac.wordpress.org/browser/apppresser/trunk/inc/AppPresser_Theme_Switcher.php?rev=2456516#L133","tags":["x_transferred"]},{"url":"https://plugins.trac.wordpress.org/changeset/3093975/apppresser","tags":["x_transferred"]}]}]}}